New layout and features for Google+

Social

SocialMedia_June04_BOne of the most popular Internet based services is social media. It has drastically changed the way we communicate and interact with one another. One of the bigger platforms, Google+, has been consistently playing catch-up with other more popular services. However, Google recently announced and rolled out a big update to Google+ that should make it more appealing for many users.

Here is an overview of the new Google+ features recently introduced.

A new layout
One of the first things you will notice about the updated Google+ is the layout has been drastically changed. On the main (Home) screen you will notice that posts have been changed to individual cards, similar to the Google Now cards, and are arranged in either one, two or three columns. These posts now take up more space horizontally which makes it far easier to view more content at the same time.

The menu bar that took up the left-hand side of the previous layout has been moved and is now collapsible. If you hover over Home on the upper-left of the screen the menu will pop out from the left-side. Circles and related feeds have also been added at the top of the window and clicking on a related circle name will bring up content only from your friends in that circle.

Adding new posts has also been turned into a card layout which is found at the top-left of the content stream. The different options e.g., Text, Photos, Link, Video and Hangout, are now big buttons that you can push to create a related post.

Improved Hangouts
Possibly the most intriguing new feature introduced is actually an update to the existing Hangouts. The numerous Google chat functions have been merged into a single chat and video messaging app available for Google+, iPhone, iPad, Android, Gmail and Chrome.

This means that you can host group chats for up to 10 participants which users can access through various systems. What this means for businesses is that you now have an easier way to communicate across multiple systems without having to worry about compatibility.

Better pictures and albums
A key component of any social media platform is visual content like pictures and videos. Google has introduced some interesting photo based features that could help make your content even more attractive. One feature is Auto Enhance, which will touch-up photos by looking at factors such as blur, contrast, saturation, etc. From what we have seen, the touch-ups are effective in making your pictures look better.

There is also a new feature called Auto Awesome, which looks at the types of photos you upload and can do various impressive things. For example, if you upload a series of similar pictures, say a sequence of images taken one after the other in a short amount of time, Auto Awesome will create an animated GIF which you can share on your wall. This function can also create panorama or HDR images.

Auto Highlight is another recently introduced feature which uses an algorithm to analyze pictures and skip over duplicate, blurry or underexposed pictures while uploading them, supposedly leaving you with only the best pictures.

Hashtags
The hashtag (#) has become popular on many social media platforms and is an easy way to find similar content. Google+ has improved the hashtag system and will now automatically add relevant tags to your posts. You will see these as small blue tabs on the right of the card, and hovering over these will show the relevant hashtag. If you click on it, the card will flip over and show you other posts that have the same tag. This could be a great way to find similar content and could help bring more exposure to your profile.

The new Google+ layout is definitely a big change compared to previous versions and could prove to be useful for your company’s profile and online presence. If you would like to learn more about using Google+ please contact us.

Published with permission from TechAdvisory.org. Source.

4 types of password management systems

Security_May29_BThe Internet has undoubtedly made our lives easier, and some would even say better. It is a bit of a double edged sword however, as we have seen an increase in the number of security breaches and hacks exposing our information. One way to minimize data being exposed or stolen is to use different passwords for every site. While this is advisable and fine in theory, it can be a pain to actually keep track of all of your different passwords in reality. That’s where a password management system can help. The next decision is what type of password management system you should use.

Below is a brief overview of the four types of password management system you can use.

1. Cloud or Internet-based
These systems are usually cloud based and accessed through an app or browser plugin. Apps ordinarily store your passwords, or generate one to use, and will automatically apply this when you visit a site that requires a password. These systems are great for breaking the one password habit, However, because they store all of your passwords in one place, they could become a target for hackers.

2. Cloud or Internet-based with two-factor authentication
The next step up from the cloud-based password management system is one that supports two-factor authentication. Your passwords are still stored in the cloud, but you will need to provide another piece of information before you can access sites.

The interesting thing is that many of the cloud based password systems actually offer this in their premium offerings. So, not only do you get better password protection, but it’s with the same system meaning you likely won’t have to switch.

The cloud based systems are a good idea if you use more than one system on a regular basis and if you work from outside of the office.

3. Computer-based
Computer-based password management systems are similar to the cloud versions, only the passwords are stored on your computer, and accessed using a master password. Because many hackers usually don’t go after individual hard drives – they have to get through your network and then find the program and try to break the password – the chances of your passwords being exposed are minimized.

The only problem with systems like these is that you normally have to log in for the service to work. If you forget to log out and someone walks by, they will be able to access everything. However, for the manager who wants a secure system, this is a better option than the cloud based versions.

4. USB-based
There are a number of USB devices that have a smart card in them that can store passwords. When you plug in the USB to your computer, the software on the USB can input the stored passwords when needed. These devices are typically more expensive, with some costing as much as USD$100, but they offer the highest amount of security as your passwords are kept with you.

The main downside to these devices is that they aren’t the biggest and are usually about the size of a standard USB stick. This means that they are easier to lose, making getting your passwords back even tougher.

If you are looking for a better way to keep track of your passwords, please contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

5 ways you can manage your reputation

Business value

BusinessValue_May29_BWhen it comes to your business on the Internet, reputation and a presence are everything. Customers expect you to be online, and many companies go to great lengths to establish and protect their reputation and image. Part of being online means that you will eventually have to deal with a complaint, and if you handle it wrong, you could see your reputation tarnished and customers disappear. To minimize the chance of this happening, it is a good idea to practice some reputation management.

Here are five reputation management practices you can employ to better manage your online brand.

1. Don’t remove negative content
If you see a negative comment or post online it may be your first impulse to delete it. This isn’t necessarily advisable, as the main rule about the Internet is that nothing ever goes away. If you delete negative comments on a regular basis, customers could notice and this may lead to them losing trust in your company and ultimately, to lost sales.

What you should be doing is replying instead and encouraging any users who complain online or make criticizing posts to contact you directly, or through a more private medium like email. That being said, if you see malicious posts or content that is posted just to incite a negative reaction (trolling), there is nothing wrong in deleting. Just make sure to acknowledge this by posting a warning that states something along the lines of: “Please note, malicious content will be deleted.”

2. Address complaints promptly
You should have someone monitoring your online platforms for complaints or negative feedback, so that you can respond promptly. This will also show customers that you actually use your platforms and are willing to engage. If you do not take steps to address negative material, you could be sending the message that you don’t care enough about customers, which could drive them away.

3. Provide people with a place to complain
Being proactive is important when it comes to reputation management. Instead of waiting for complaints to be posted on various review sites, blogs or even social media, which are all out of your control, why not provide a place that you can control, for all types of feedback.

Having an easy to see form, forum or other similar area on your website, where customers can interact with you, could go a long way in helping limit where complaints pop up. If you are in control then you’re more likely to see complaints sooner and better able to answer them quickly too.

4. Ensure colleagues and staff are all on the same page
Two things that turn almost customers off of a brand are a company that isn’t organized and being told different things by different people within the same company. If you have more than one staff member managing your online reputation you need to ensure everyone is on the same page. If a client asks a question they should get one answer and if there is a complaint there should be one response or person handling it.

It is a good idea to establish how to deal with complaints, who will deal with them and when they will be dealt with, and communicate this with all staff, not just those handling your online presence. A unified procedure could go a long way in minimizing the harm negative feedback can cause.

5. Monitor online activity
We don’t mean monitor the activity of your employees, we mean take a look at the different communication channels used by your customers and the public at large. If your business relies on reviews, simply monitoring your own profiles and website isn’t enough. Many customers complain on review sites like Yelp, Ripoff Report, or their own blogs. Taking time to search for, and browse these sites could help you gauge the general perception of your company. If you see an increasing number of negative reviews for example, you know it is time to look at what needs to be improved.

Having a well managed online reputation won’t guarantee new customers will come flooding in the door, but it can help decrease customers from going out the door, taking valuable sales with them. If you would like to learn more about reputation management please contact us today.

Published with permission from TechAdvisory.org. Source.

Email fraud – 5 tips to help you spot it

Security_April18_BBusiness owners and managers have many concerns they must address on a regular basis, or at least be aware of. Some of security concerns revolve around fraud, more specifically email fraud. While this isn’t a new concept, email fraud and scam occurrences are on the rise, and it is vital to know how to spot them.

Here’s five tips to help you spot email frauds or scams.

Look at the email address
One of the easiest ways to spot a fraudulent email or scam is by looking at the email address of the sender. Many credit card application scams use third party email services like Gmail or Yahoo. Some scammers go so far as to set up accounts in the name of the company e.g., AMEX_121@gmail.com.

Sophisticated scammers will actually try to copy the legitimate company’s email account – a practice called spoofing. They will usually have a few changes like a missing letter from the address, or an extra . added.

The easiest thing you can do is look for the sender’s site on the Internet. For example: You get an email from AMEX OPEN (American Express’s small business credit card) and notice that the sender’s email address just doesn’t look right. Go to Google and search for amex fraud. You’ll likely find the fraud page which tells you exactly how the company sends emails. If the sender is a smaller company, most of these will have email contact addresses right on the site, take a look and compare the two. If they are different, the email is likely a scam.

Look at the sender’s website
If you think an email is fraudulent, try looking up the website associated with the sender. Should you be unable to find the site, it’s likely a scam.

If you find a website, click through some pages to see if there is anything that looks out of place. For example a website selling a new financial service has pages with Coming Soon or you get errors when you try to load the page. If it looks fishy, it likely is – delete the email.

It would also be a good idea to go to archive.org’s Wayback Machine, copy and paste the website’s URL into the The Wayback Machine Search bar and hit Take me back. This will bring up previous versions of the website. If you see that the site in question was something completely different a few months to a year ago (e.g., it is a financial services page now, but six months ago it was a page selling prescription drugs), chances are high it’s a fraud.

Call them
Many scammers will put phone numbers into emails to make them look more legitimate. If you are unsure about whether this email is legitimate or not, why not try calling the number? Many scammers run more than one fraud operating at the same time and may answer the phone with another name, or not at all.

Similarly, if you call a local number of a supposedly small business and get routed directly to voicemail, it’s likely fraud.

Look carefully at the body of the message
The body of the email can also be a great way to suss out email scammers and potential fraud. Because many fraudulent emails originate outside of the major English speaking countries, there will often be language that just sounds different from the way people write in your area. One great example of this would be a line like ‘We wish to sell you a great product.’

You should also look for spelling errors, grammar mistakes or inconsistencies. While some fraudulent emails will have minor spelling inconsistencies, others will spell common words wrong. If you see mistakes like ‘our product are a great deals’, this should raise a warning flag.

Spelling and grammar errors are a part of business communication, so don’t expect a perfect email from all companies, especially if you see that the company is located overseas. It’s the emails with mistakes supposedly coming from companies in your area that should really raise alarm.

The sender asks for money or passwords
It’s kind of an unwritten rule that when sending out emails you never ask for a person’s credit card number or account passwords. Banks, large companies and many social networks will never ask you for passwords or account information, credit card numbers, pin codes, etc of any kind over email. If you notice that an email selling something asks for you to reply with a credit card details so you can make a purchase, it’s best to delete the email as it’s likely a fraud.

Email fraud is a big deal, and unfortunately it will likely become even more common in the near future. This means you should be able to spot potentially fraudulent emails. If you think an email is a scam, it’s best to just delete it immediately. Don’t respond or forward it to colleagues or employees. If you need to let people know, write another email that describes the suspected email but has no links. You can also forward a screenshot to your colleagues or friends to illustrate the scam.

Looking for more ways you can protect your company? Contact us today. We can work with you to develop a security system that will meet your needs.

Published with permission from TechAdvisory.org. Source.